Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 07:55
Behavioral task
behavioral1
Sample
7c91f57e9c8c1b2216662d4e70deef82.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c91f57e9c8c1b2216662d4e70deef82.exe
Resource
win10v2004-20231215-en
General
-
Target
7c91f57e9c8c1b2216662d4e70deef82.exe
-
Size
47KB
-
MD5
7c91f57e9c8c1b2216662d4e70deef82
-
SHA1
405c75f3f29145ab85baadf5960f5aa8f4ff945c
-
SHA256
2a450f60c215eac864468cf757d1dfe3d6db2e772ff75cbbcd3c3c02c282d9cf
-
SHA512
854d7797e59b1606efa858c41ebadfd4535c86e60993e3ac921f267fd9cce49e0f6f3458b9e852a3849de79506acf7a80c30dc54ba0d1026f30d097e0736ffbb
-
SSDEEP
768:GVhwVJXmsuBlNxZOPFNdRCuNqdSSQ57uf1WyDgXKcNDPhBkuI1IR:Qhulp6zxZO9Nd46qYSQ5Swy86cNDPEVa
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/1752-2-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral1/memory/1752-18-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral1/memory/2744-19-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 behavioral1/memory/2744-17-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2744 WinRaR.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 7c91f57e9c8c1b2216662d4e70deef82.exe 1752 7c91f57e9c8c1b2216662d4e70deef82.exe -
resource yara_rule behavioral1/memory/1752-2-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x0009000000016a29-9.dat upx behavioral1/memory/1752-18-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2744-19-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2744-17-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\WinRaR\WinRaR.dll WinRaR.exe File opened for modification C:\Windows\WinRaR\ 7c91f57e9c8c1b2216662d4e70deef82.exe File created C:\Windows\WinRaR\WinRaR.exe 7c91f57e9c8c1b2216662d4e70deef82.exe File opened for modification C:\Windows\WinRaR\WinRaR.exe 7c91f57e9c8c1b2216662d4e70deef82.exe File created C:\Windows\WinRaR\WinRaR.dll 7c91f57e9c8c1b2216662d4e70deef82.exe File opened for modification C:\Windows\WinRaR\ WinRaR.exe File created C:\Windows\WinRaR\WinRaR.exe WinRaR.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1752 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeRestorePrivilege 1752 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeBackupPrivilege 1752 7c91f57e9c8c1b2216662d4e70deef82.exe Token: SeRestorePrivilege 1752 7c91f57e9c8c1b2216662d4e70deef82.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2744 1752 7c91f57e9c8c1b2216662d4e70deef82.exe 28 PID 1752 wrote to memory of 2744 1752 7c91f57e9c8c1b2216662d4e70deef82.exe 28 PID 1752 wrote to memory of 2744 1752 7c91f57e9c8c1b2216662d4e70deef82.exe 28 PID 1752 wrote to memory of 2744 1752 7c91f57e9c8c1b2216662d4e70deef82.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c91f57e9c8c1b2216662d4e70deef82.exe"C:\Users\Admin\AppData\Local\Temp\7c91f57e9c8c1b2216662d4e70deef82.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\WinRaR\WinRaR.exeC:\Windows\WinRaR\WinRaR.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5f6d1588a70559ba8f57eefd10c3f9878
SHA10712011ad8e6e07b590e912edca9ca7425b617ef
SHA25611f491aeb909d3f22c977258738848b1655814f5b9d8c1e69052a42aca9065b5
SHA51234b29b61fbc4fd1382aacbeaa07dea4fbf1061aafd17525036d8cc6776c23227d229733b475c9c8139b458a558527615c59d83e47f2e7e44abcf7abe85e0d8d8
-
Filesize
47KB
MD57c91f57e9c8c1b2216662d4e70deef82
SHA1405c75f3f29145ab85baadf5960f5aa8f4ff945c
SHA2562a450f60c215eac864468cf757d1dfe3d6db2e772ff75cbbcd3c3c02c282d9cf
SHA512854d7797e59b1606efa858c41ebadfd4535c86e60993e3ac921f267fd9cce49e0f6f3458b9e852a3849de79506acf7a80c30dc54ba0d1026f30d097e0736ffbb